{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T23:51:07Z","timestamp":1725407467439},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1109\/sncc.2014.6866524","type":"proceedings-article","created":{"date-parts":[[2014,7,30]],"date-time":"2014-07-30T17:18:09Z","timestamp":1406740689000},"page":"1-5","source":"Crossref","is-referenced-by-count":1,"title":["Policy exchange and management for Policy Compliance and Change Detection System in managed service in data networks"],"prefix":"10.1109","author":[{"given":"Saeed M.","family":"Agbariah","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"17","article-title":"Randomness recommendations for security","author":"eastlake iii","year":"0","journal-title":"IETF RFC"},{"key":"15","first-page":"40","article-title":"Network security technologies","author":"kwok","year":"2005","journal-title":"Auerbach Publications"},{"key":"16","first-page":"54","article-title":"Network security technologies","author":"kwok","year":"2005","journal-title":"Auerbach Publications"},{"key":"13","first-page":"124","article-title":"Hack the stack: Using snort and ethereal to master the 8 layers of an insecure netork","author":"gregg","year":"2006","journal-title":"Syngress Publishing"},{"key":"14","first-page":"34","article-title":"Network security technologies","author":"kwok","year":"2005","journal-title":"Auerbach Publications"},{"key":"11","article-title":"Simple Authentication and Security Layer (SASL)","author":"melnikov","year":"2006","journal-title":"IETF RFC 4422"},{"key":"12","article-title":"Lightweight Directory Access Protocol (LDAP): The Protocol","author":"sermersheim","year":"2006","journal-title":"IETF RFC 4511"},{"doi-asserted-by":"publisher","key":"3","DOI":"10.1109\/SNCC.2014.6866525"},{"key":"2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.5121\/csit.2013.3801","article-title":"Automated policy compliance and change detection managed service in data networks","author":"agbariah","year":"2013","journal-title":"Second International Conference on Advanced Information Technologies and Applications"},{"doi-asserted-by":"publisher","key":"1","DOI":"10.1109\/ICCCN.2011.6006050"},{"key":"10","article-title":"Lightweight directory access protocol (LDAP): Authentication methods and security mechanisms","author":"harrison","year":"2006","journal-title":"IETF RFC 4513"},{"key":"7","article-title":"The COPS (Common Open Policy Service) Protocol","author":"durham","year":"2000","journal-title":"IETF RFC 2748"},{"key":"6","article-title":"COPS usage for policy provisioning (COPS-PR)","author":"chan","year":"2001","journal-title":"IETF RFC 3084"},{"key":"5","article-title":"Policy core lightweight directory access protocol (LDAP) Schema","author":"strassner","year":"2004","journal-title":"RFC3703"},{"key":"4","article-title":"Terminology for policy-based management","author":"westerinen","year":"2001","journal-title":"RFC 3198"},{"key":"9","article-title":"Substituting COPS-PR: An evaluation of NETCONF and SOAP for policy provisioning","author":"edgard","year":"2006","journal-title":"Proceedings of the Seventh IEEE International Workshop on Policies for Distributed Systems and Networks"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1109\/POLICY.2006.35"}],"event":{"name":"2014 International Symposium on Networks, Computers and Communications (ISNCC)","start":{"date-parts":[[2014,6,17]]},"location":"Hammamet, Tunisia","end":{"date-parts":[[2014,6,19]]}},"container-title":["The 2014 International Symposium on Networks, Computers and Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6861313\/6866503\/06866524.pdf?arnumber=6866524","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T13:37:22Z","timestamp":1498138642000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6866524\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/sncc.2014.6866524","relation":{},"subject":[],"published":{"date-parts":[[2014,6]]}}}